- This event has passed so registration is closed.
The remote and hybrid work revolution forced organizations to rework their identity and access management procedures to ensure that distributed workforces could access internal resources securely. However, critical third-party vendors and business partners also require access to internal systems and data, and as recent supply chain attacks have demonstrated, a vendor with a poor security posture is as much of an “insider threat” as an untrained or malicious employee. This webinar will examine the risks posed by supply chain attacks, discuss high-level considerations when assessing the security posture of vendors and partners, and propose strategies for mitigating vendor risk from within your organization.
Lee Neely – Information Assurance APL, LLNL
Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely
Teresa Rothaar – GRC Analyst, Keeper Security
Teresa Rothaar is a governance, risk, and compliance (GRC) analyst at Keeper Security. Prior to this, she spent six years as a cybersecurity copywriter, where she produced hundreds of blogs and ghostwritten articles, dozens of whitepapers and case studies, and other thought leadership content for cybersecurity firms ranging from small startups to multinational corporations. She holds an MBA and an MS in management information systems from Wilmington University, and a B.S. in mathematics and computer science from Temple University.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.